|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 102 occurrences of 63 keywords
|
|
|
Results
Found 116 publication records. Showing 116 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
18 | Praveen Sivadasan, P. Sojan Lal, Naveen Sivadasan |
JDATATRANS for array obfuscation in Java source codes to defeat reverse engineering from decompiled codes. |
Bangalore Compute Conf. |
2009 |
DBLP DOI BibTeX RDF |
restructured arrays, source code obfuscation, reverse engineering |
18 | Katerina Dolgova, Alexander Chernov |
Automatic Type Reconstruction in Disassembled C Programs. |
WCRE |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Jingbo Zhang, Rongcai Zhao, Jianmin Pang, Wen Fu |
Formal Abstraction of Semantics for Detecting Malicious Code. |
CSSE (2) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Jingbo Zhang, Wen Fu, Jianmin Pang, Rongcai Zhao |
Using Propositional Calculas to Accurately Structure Control-Flow from Binary Executables. |
CSSE (2) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Greg Stitt, Frank Vahid |
Binary synthesis. |
ACM Trans. Design Autom. Electr. Syst. |
2007 |
DBLP DOI BibTeX RDF |
Binary synthesis, synthesis from software binaries, FPGA, hardware/software codesign, hardware/software partitioning, configurable logic, warp processors |
18 | Atsushi Ohori |
A proof theory for machine code. |
ACM Trans. Program. Lang. Syst. |
2007 |
DBLP DOI BibTeX RDF |
Curry-Howard isomorphism |
18 | Elvira Albert, Miguel Gómez-Zamalloa, Laurent Hubert, Germán Puebla |
Verification of Java Bytecode Using Analysis and Transformation of Logic Programs. |
PADL |
2007 |
DBLP DOI BibTeX RDF |
|
18 | François Garillot, Benjamin Werner |
Simple Types in Type Theory: Deep and Shallow Encodings. |
TPHOLs |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Haifeng He, John Trimble, Somu Perianayagam, Saumya K. Debray, Gregory R. Andrews |
Code Compaction of an Operating System Kernel. |
CGO |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Jingbo Zhang, Rongcai Zhao, Jianmin Pang |
Parameter and Return-value Analysis of Binary Executables. |
COMPSAC (1) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Tao Wei, Jian Mao, Wei Zou, Yu Chen |
Structuring 2-way Branches in Binary Executables. |
COMPSAC (1) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan |
Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings. |
MM&Sec |
2007 |
DBLP DOI BibTeX RDF |
anti-disassembly, oblivious hashing, overlapped code, obfuscation, tamper-resistance, integrity checking |
18 | Jiang Zheng 0001, Brian Robinson, Laurie A. Williams, Karen Smiley |
A process for identifying changes when source code is not available. |
ACM SIGSOFT Softw. Eng. Notes |
2005 |
DBLP DOI BibTeX RDF |
change identification, COTS |
18 | Fubo Zhang, Erik H. D'Hollander |
Using Hammock Graphs to Structure Programs. |
IEEE Trans. Software Eng. |
2004 |
DBLP DOI BibTeX RDF |
optimization, parallel processing, compilers, Program transformation, structured programming, correctness proofs, software/program verification |
18 | D. Curran, Neil J. Hurley, Mel Ó Cinnéide |
Securing Java through software watermarking. |
PPPJ |
2003 |
DBLP DOI BibTeX RDF |
Java protection, copyright infringement, software watermarking, spread spectrum watermarking |
18 | Raja Vallée-Rai, Phong Co, Etienne Gagnon, Laurie J. Hendren, Patrick Lam 0001, Vijay Sundaresan |
Soot - a Java bytecode optimization framework. |
CASCON |
1999 |
DBLP BibTeX RDF |
Java |
Displaying result #101 - #116 of 116 (100 per page; Change: ) Pages: [ <<][ 1][ 2] |
|